US20240036851A1 - Hybrid cloud package build architecture - Google Patents
Hybrid cloud package build architecture Download PDFInfo
- Publication number
- US20240036851A1 US20240036851A1 US17/876,192 US202217876192A US2024036851A1 US 20240036851 A1 US20240036851 A1 US 20240036851A1 US 202217876192 A US202217876192 A US 202217876192A US 2024036851 A1 US2024036851 A1 US 2024036851A1
- Authority
- US
- United States
- Prior art keywords
- package component
- external package
- external
- local
- component
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000010354 integration Effects 0.000 claims abstract description 29
- 238000000034 method Methods 0.000 claims description 28
- 230000008569 process Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 6
- 238000013459 approach Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/0802—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
- G06F12/0866—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches for peripheral storage systems, e.g. disk cache
- G06F12/0868—Data transfer between cache memory and other subsystems, e.g. storage devices or host systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
Definitions
- Container orchestration systems automate the deployment, scaling, and management of containerized applications among nodes in a cluster. Some applications can build packages (e.g., data packages, software packages, etc.) from packaged components.
- packages e.g., data packages, software packages, etc.
- a local computer system can build packages that have some local dependencies and some dependencies obtained from an external repository.
- the external dependencies can include external package components that can be updated and deprecated over time.
- the external package components can be fetched from the external repository as needed (or as expected to be needed), and a local cache can be automatically maintained to mirror package versioning in the external repository.
- a hybrid architecture can facilitate integration of local package components with up-to-date external package components fetched from an external repository.
- a method in one example includes determining, by a computer system including one or more processor devices, a trigger for fetching an external package component for integration with a local package component.
- the example method includes transmitting, by the computer system and based on the trigger, a request to an external package repository to obtain the external package component.
- the example method includes receiving, by the computer system and responsive to the request, the external package component.
- the example method includes caching, by the computer system, the external package component for integration with the local package component.
- a computing device in another example, includes a memory and a processor device coupled to the memory to determine a trigger for fetching an external package component for integration with a local package component.
- the example computing device includes the processor device coupled to the memory to transmit, based on the trigger, a request to an external package repository to obtain the external package component.
- the example computing device includes the processor device coupled to the memory to receive, responsive to the request, the external package component.
- the example computing device includes the processor device coupled to the memory to cache the external package component for integration with the local package component.
- a non-transitory computer-readable storage medium includes executable instructions to cause one or more processor devices of one or more computing devices to determine a trigger for fetching an external package component for integration with a local package component.
- the instructions cause the processor device to transmit, based on the trigger, a request to an external package repository to obtain the external package component.
- the instructions cause the processor device to receive, responsive to the request, the external package component.
- the instructions cause the processor device to cache the external package component for integration with the local package component.
- FIG. 1 is a block diagram of a runtime environment in which examples of a hybrid package build architecture according to example aspects of the present disclosure can be practiced;
- FIG. 2 is a flowchart of a method for implementing a hybrid package build architecture according to example aspects of the present disclosure according to one example;
- FIG. 3 is a simplified block diagram of the runtime environment illustrated in FIG. 1 according to one example.
- FIG. 4 is a block diagram of an example of a computing device illustrated in FIG. 1 suitable for implementing examples according to one example.
- software packages can be developed to have dependencies on packaged components.
- software packages can be built for deployment or distribution by combining or integrating a number of package components.
- Some packages can include off-the-shelf components.
- off-the-shelf components would need to be manually retrieved for building a package with other components.
- a local copy of an external repository could be manually constructed for access when building packages using local and external packages. But the external repository can be updated over time, rendering such a local copy out-of-date.
- external package components can be updated to new versions or deprecated and pulled from distribution. This generally presents a challenge for an administrator of the local copy to both know what is out of date and obtain the up-to-date package components (and any requisite further dependencies).
- example implementations can provide for implementing a hybrid package build architecture that automatically manages retrieval of external package components for integration with local package components.
- implementations can determine a trigger for fetching an external package component for integration with a local package component (e.g., for building a software package). Based on the trigger, implementations can transmit a request to an external repository to obtain the external package component. Responsive to the request, implementations can receive the external package component. Implementations can cache the external package component for integration with the local package component, and optionally for future use for future build tasks.
- the package build architecture can interface with external package sources (e.g., external package build architectures) to leverage the external resources and minimizing unnecessary duplicative build tasks.
- FIG. 1 is a block diagram of an environment suitable for implementing an example optimization of a pipeline of services according to example implementations of the present disclosure.
- a local computing system can include processor device 12 and memory 14 .
- the local computing system 10 may be a computing system that includes multiple computing devices.
- the local computing system 10 may be one or more computing devices within a computing system that includes multiple computing devices.
- the local computing system 10 can be implemented using shared resources of a computing device (e.g., processor device 12 and memory 14 being shared with one or more other systems, applications, processes, etc.).
- local can indicate an instantiation of a system or process under control, management, or access by a party associated with the system or process.
- local can indicate, but is not necessarily limited to, an on-premises instantiation of the system of process.
- local can indicate a cloud instantiation of the system or process.
- the local computing system 10 can be implemented by a deployed application in a containerized environment.
- the processor device 12 may include any computing or electronic device capable of executing software instructions to implement the functionality described herein.
- the memory 14 can be or otherwise include any device(s) capable of storing data, including, but not limited to, volatile memory (random access memory, etc.), non-volatile memory, storage device(s) (e.g., hard drive(s), solid state drive(s), etc.).
- the local computing system 10 can communicate with one or more additional computing systems via a network 16 .
- the source computing system can communicate with an external computing system 18 .
- the external computing system 18 can include processor device(s) 20 and memory 22 .
- the external computing system 18 may be a computing system that includes multiple computing devices.
- the external computing system 18 may be one or more computing devices within a computing system that includes multiple computing devices.
- the external computing system 18 can be implemented using shared resources of a computing device (e.g., processor device(s) 20 and memory 22 being shared with one or more other systems, applications, processes, such as with local computing system 10 , etc.).
- the external computing system 18 can be implemented by a deployed application in a containerized environment.
- the processor device(s) 20 may include any computing or electronic device capable of executing software instructions to implement the functionality described herein.
- the memory 22 can be or otherwise include any device(s) capable of storing data, including, but not limited to, volatile memory (random access memory, etc.), non-volatile memory, storage device(s) (e.g., hard drive(s), solid state drive(s), etc.).
- a first party can manage or use the local computing system 10 for building first party software packages.
- the local computing system 10 can provide a package build architecture for the first party development pipeline.
- a custom package can be built from multiple different package components from multiple different sources.
- Some package components can be local package components, such as local package component 24 available on a local computing system 10 and developed by a first party for building a first party software package.
- the first party can build first party software packages using local package component 24 stored in the memory 14 .
- first party software packages can include applications developed by the first party.
- some package components can be external package components, such as package components available from an external repository on a remotely managed system and developed by a third party for distribution.
- external package components can provide building blocks for various software functionalities, such that first party local package components can be built with dependencies on third party building blocks.
- a third party can manage or use the external computing system 18 for hosting or distributing third-party software packages.
- the third party can expose an external package repository 26 to the network 16 for distribution of external package components 28 .
- the external package components 28 can include software package components developed by the third party for providing various software functionalities and services.
- the external package components 28 can include building blocks of software functionality for combination with or integration into downstream software package builds.
- example implementations of the present disclosure can provide for retrieving external package components 28 from the external package repository 26 .
- the local computing system 10 can fetch the external package component 28 for integration with the local package component 24 .
- implementations can provide for automatic maintenance of a local cache of external package components from one or more external repository sources. For instance, in some examples, a just-in-time caching scheme can be implemented to obtain external package components on-demand. In some examples, a predictive caching scheme can be implemented to obtain external package components based on predicted use of the external package components. In this manner, for example, implementations according to aspects of the present disclosure can provide for maintenance of an up-to-date cache that updates, replaces, or removes package components based on corresponding changes in the external repository.
- fetched external package component 28 can be stored in a cache 30 .
- the cache 30 can store fetched external package component 28 for present and future use in building packages by the local computing system 10 .
- a computer system can maintain a local cache based on a trigger system. For instance, a computer system can determine a trigger based on a need for an external package component. In some examples, the computer system can determine the need based on a queued or scheduled package build. For instance, the computer system can determine the need based on a list of package components associated with a package build task. In this manner, for instance, some implementations can provide for just-in-time or on-demand fetching of up-to-date external package components for loading into the cache for use in the package build.
- the local computing system 10 can fetch the external package component 28 based on a trigger. For instance, the local computing system 10 can determine a trigger event or condition. Additionally, or alternatively, an operator 32 can determine a trigger event or condition. The operator 32 can be implemented as part of the local computing system 10 , the external computing system 18 , cooperatively between both, or on a different computing system. For instance, the operator 32 can be executed as part of a service that provides one or more repository management services for the local computing system 10 (e.g., for the first party).
- a package build task being queued can trigger a process for obtaining any external package component 28 needed for the build task.
- the trigger can be based on configuration data associated with the package build task.
- a custom resource 34 can be defined that sets out a policy for creating or maintaining the cache 30 .
- the custom resource 34 can be a data structure containing definitions, instructions, links, network addresses, URLs, credentials, etc.
- the policy can include various rules for retrieving package components (e.g., update intervals, preferred hosts, versioning types, such as long term or nightly builds, etc.).
- the custom resource 34 can identify one or more external package components 28 to be maintained in the cache 30 .
- the custom resource 34 can be associated with a particular package build task, and the custom resource 34 can enumerate one or more external package components 28 to be used for that particular package build task.
- the external package components 28 can be identified with a version number.
- a tagging system can identify external package components 28 .
- external package components 28 can be tagged to associate the external package components 28 with a particular package build task. Based on the tag association, the external package components 28 can be obtained from the external package repository 26 or the cache 30 when the package build task is executed. Based on the tag association, the local computing system 10 can monitor the package component source (e.g., the external package repository 26 ) for any changes, and update the cache 30 accordingly.
- the package component source e.g., the external package repository 26
- the custom resource 34 can contain instructions for directing a computer system (e.g., local computing system 10 ) to perform according to aspects of the present disclosure.
- the custom resource 34 can instruct the operator 32 to maintain the cache 30 in view of the external package repository 26 according to a desired policy.
- a computer system can determine the need based on a projected or predicted use. For instance, usage data (e.g., log data) descriptive of external package component usage (e.g., collected over a period of time) can provide a basis for predicting future usage of external package components. For instance, a predictive model (e.g., a machine-learned predictive model) can predict future usage based on log data. In this manner, for instance, the computer system can prefetch external package components.
- usage data e.g., log data
- external package component usage e.g., collected over a period of time
- a predictive model e.g., a machine-learned predictive model
- a predicted package build task can trigger a process for obtaining expected external package component 28 that are expected to be needed for a predicted build task.
- a prediction of likely needs for external package components 28 can trigger a process for obtaining the likely needed external package component 28 (e.g., separately from any predicted or scheduled build task).
- an interval of time e.g., since the last cache update, the last update to a particular package component, etc.
- the local computing system 10 or the operator 32 can transmit a request to the external computing system 18 to request the desired packages.
- the request can be contemporaneously responsive to the trigger.
- the request can be scheduled for some future time based on detecting the trigger at a first time.
- the request can identify the desired package components with various levels of particularity.
- the request can indicate a particular version or build of the package components.
- the request can indicate a name of a package but allow the external computing system 18 to provide an updated version if available. For example, the request can indicate a list of packages and request any updates to the packages, if available.
- the local computing system 10 can receive any fetched external package components (e.g., from the external computing system 18 ) and store them in the cache 30 .
- the cached external package components 28 can be used in multiple package build tasks, such as in subsequent package build tasks after a package build tasks that triggers an original request to retrieve or update the cached external package components 28 .
- the external package components 28 can be used in a first build task for integrating the external package components 28 with a first local package component and later retrieved from the cache for a second build task for integrating the external package components 28 with a second local package component.
- the local computing system 10 or the operator 32 can initiate updates to the cache 30 .
- the local computing system 10 or the operator 32 can monitor for any updates to packages in the cache 30 .
- the local computing system 10 or the operator 32 can monitor the cache 30 to ensure that package components in the cache 30 are maintained. For instance, if external package components 28 in the cache 30 are removed or altered, the local computing system 10 or the operator 32 can repair the cache 30 by fetching a clean copy of the external package components 28 from the external package repository 26 .
- the local computing system 10 or the operator 32 can monitor the external package repository 26 for any changes to any packages cached in the cache 30 .
- the local computing system 10 or the operator 32 can request an accounting of current versions of a list of packages (e.g., a list of external package components 28 in the cache 30 ) and compare the versions in the external package repository 26 with the versions in the cache 30 . Based on any differences, the local computing system 10 or the operator 32 can trigger obtaining the current versions for updating the cache 30 .
- a list of packages e.g., a list of external package components 28 in the cache 30
- the local computing system 10 or the operator 32 can trigger obtaining the current versions for updating the cache 30 .
- the local computing system 10 can rebuild one or more downstream packages responsive to an update to the external package components 28 retrieved from the external package repository 26 .
- the local computing system 10 can cause a rebuild of any packages with updated dependencies (e.g., updated based on a corresponding update to the external package repository 26 ).
- the local computing system 10 can provide a local repository of external packages for use by the local computing system 10 .
- the local repository can be organized by a tagging system that associates packages with build tasks based on a tag assigned to the packages.
- an external package component 28 can be associated with a tag, and the assignment of the tag can be a trigger as discussed herein for obtaining the external package component 28 .
- the local repository can be implemented in a containerized environment.
- a package build architecture can be implemented as one or more containerized application(s).
- the one or more containerized application(s) can collectively form the local computing system 10 , even if the containerized application(s) are not physically localized together.
- the package build architecture can be implemented as a pod of containerized application(s).
- containerized application refers to an application that comprises one or more container images, and is initiated and managed via a container orchestration system.
- a container image is initiated as a Linux® container, wherein the Linux® kernel features cgroups and namespaces are used to isolate processes from one another.
- a container image is often created from a containerization technology, such as, by way of non-limiting example, Docker®, or the like.
- container orchestration system refers to a system that automates the deployment, scaling and management of containerized applications among nodes in a cluster.
- the Kubernetes® container orchestration system (Kubernetes.io) is one example of a container orchestration system.
- each resource of an application is typically defined in a YAML Ain′t Markup Language (YAML) file and has a “kind” attribute (sometimes referred to herein as “type”) and a “name” attribute.
- YAML YAML Ain′t Markup Language
- Container orchestration systems automate the deployment, scaling, and management of containerized applications among nodes in a cluster.
- a containerized application may include tens or hundreds of different containers and other resources, and each container or resource may have any number of instances distributed over many different nodes in a cluster.
- a containerized application may be distributed over many different nodes in several different clusters.
- a containerized application can include a package build architecture.
- a package building software can be implemented in a containerized environment for deployment as a containerized application or in support of building containerized applications.
- the package build architecture can include a central hub or server (e.g., in one container or containerized environment) that communicates with a number of workers (e.g., build nodes or daemons in the same container, in the same containerized environment, etc.). In this manner, for example, the central hub can optionally centralize database read or write access.
- the package building software can be the Koji® package build software architecture, which can leverage koji-hub instances and use build daemons for building packages.
- the local repository can be implemented in a containerized application such that it appears to and is accessible by other containers in a pod.
- multiple repository instances can be set up and maintained (e.g., multiple instances of local computing system 10 , multiple containers instantiated on one or more other systems, etc.).
- the local repository can facilitate the retrieval of external package components 28 from the external computing system 18 such that the other containers in the pod need not be in communication with the external computing system 18 .
- the local repository can facilitate the retrieval of external package components 28 from the external computing system 18 such that the other containers in the pod are not aware that the external package components 28 have been fetched externally instead of built locally.
- the containerized application can interact with or be instructed by an operator.
- an operator e.g., an OpenShift operator
- a central hub e.g., koji-hub
- the instructions are based on the custom resource 34 .
- the operator 32 can be implemented by a native application in a containerized environment (e.g., a native application of a container orchestration system).
- the operator 32 can be a runtime executed by the container orchestration system to monitor and interact with containerized applications running thereon.
- the operator 32 can be managed by a backplane providing lifecycle management of the operator 32 , such as by overseeing installation, updates of, and control over the operator 32 . In this manner, for instance, the operator 32 itself can be more resilient against downtime or error, because inadvertent editing of or deletion of the operator 32 can be resolved automatically by the backplane.
- the operator 32 can manage one or more local repositories. For instance, the operator 32 can manage multiple instances of local repositories.
- the custom resource 34 can instruct the local computing system 10 or the operator 32 .
- the custom resource 34 can include an instruction file configured for instructing a container orchestration component, such as a container orchestration operator, to maintain a state of a container.
- a container can implement a local cache forming a repository, and the operator (e.g., operator 32 ) can maintain a state of the local cache according to the instructions in the custom resource 34 .
- example implementations according to the present disclosure can provide for a number of technical effects and benefits. For instance, example implementations can provide for improved system integrity and security. Relying on a manually created and maintained local cache of external package components can be error-prone. For instance, keeping up with the pace of development (e.g., for critical security patches, etc.) for a library of external package dependencies can be difficult if not impossible. Updates can be missed, leaving packages unpatched and possibly risking insecure deployments.
- example implementations according to the present disclosure can provide for automatic techniques for monitoring a source of desired package components for updates and synchronizing and updating a local cache automatically based on any changes in the source repository. In this manner, for instance, the local cache can be made more reliable and provide for package builds that leverage up-to-date dependencies for improved system integrity and security.
- example implementations can provide for improved latency for up-to-date package build tasks.
- prior approaches to resolving the need for current package components include exclusively obtaining externally-hosted package components from the external source. But such an approach relies on numerous requests for the same content from the external repository, generating redundant network traffic and causing delays in the build time while the package component(s) are fetched.
- automatically maintaining an up-to-date local cache resolves the challenges of tracking current versioning while also providing for improved latency for repeated use of the fetched package components.
- example implementations can facilitate improved firewall protection of sensitive local packages.
- some prior approaches to resolving the aforementioned challenges include using external build systems (e.g., external build systems integrated with an external repository, etc.).
- the hybrid package build architecture of the present disclosure can prove for firewall rule enforcement to keep sensitive local package components (e.g., proprietary data, proprietary algorithms, etc.) from leaking out to the external build systems.
- example implementations can facilitate improved firewall protection of sensitive local packages on computer systems.
- example implementations can provide for decreased computation cost associated with new software builds. For instance, in some prior techniques, incorporating or integrating external dependencies would require rebuilding of the packages for every update, or even a complete rebuilding of a package build software. In contrast, example implementations according to the present disclosure can advantageously avoid unnecessary rebuilding of packages by leveraging the external package components directly obtained from the external repository and already built by the third party system(s).
- example implementations can provide for increased speed of propagation of dependency updates through to a completed package build. For instance, by monitoring an external package repository for updates, and retrieving updates for external package components in a local cache, example implementations can automatically cause rebuilds of local package builds that include the updated external package components. In this manner, for instance, patches (e.g., security patches) can rapidly be propagated from an external source through to an output package build deployed in a local environment.
- patches e.g., security patches
- FIG. 2 is a flowchart of a method for implementing a hybrid package build architecture according to example aspects of the present disclosure. FIG. 2 will be discussed in conjunction with FIG. 1 .
- a computing system e.g., the local computing system 10 , the operator 32 , etc.
- the external package component can be an external package component 28
- the local package component can be a local package component 24 of the local computing system 10 .
- the local computing system 10 or the operator 32 can transmit, based on the trigger, a request to an external package repository (e.g., external package repository 26 ) to obtain the external package component.
- the request can be transmitted, for example by way of network 16 .
- the local computing system 10 or the operator 32 can receive, responsive to the request, the external package component.
- the local computing system 10 or the operator 32 can cache the external package component (e.g., in cache 30 ) for integration with the local package component.
- the external package component e.g., in cache 30
- the local computing system 10 or the operator 32 can retrieve, from a cache, the external package component for integration with a second local package component.
- the local computing system 10 or the operator 32 can update the cached external package component based on an update to the external package repository.
- the local computing system 10 or the operator 32 can instruct, using a custom resource associated with the local package component, an operator component to update the cached external package component.
- the local computing system 10 or the operator 32 can generate the request based on one or more instructions indicated in the custom resource.
- the local computing system 10 or the operator 32 can generate, using a machine-learned model configured to receive log data descriptive of external package component usage, an output indicating a likelihood of use for one or more external package components of the external package repository, and generate the request based on the output.
- a machine-learned model configured to receive log data descriptive of external package component usage, an output indicating a likelihood of use for one or more external package components of the external package repository, and generate the request based on the output.
- the local computing system 10 or the operator 32 can cache the external package component in a local repository hosted in a container of a containerized environment.
- FIG. 3 is a simplified block diagram of the environment illustrated in FIG. 1 according to one implementation.
- Local computing system 10 includes the processor device 12 and the memory 14 .
- the processor device 12 is coupled to the memory 14 .
- the processor device 12 is to determine a trigger 300 for fetching an external package component 28 for integration with a local package component 24 .
- the processor device 12 is to transmit, based on the trigger 300 , a request 302 to an external package repository to obtain the external package component 28 .
- the processor device 12 is to receive, responsive to the request 302 , the external package component 28 .
- the processor device 12 is to cache the external package component 28 for integration with the local package component 24 .
- the embodiments are illustrated as being implemented by computer system that comprises a single computing device that in turn comprises a single processor device, in practice the examples/embodiments disclosed herein may be implemented in a computer system that comprises any number of computing devices, each of which may comprise one or more processor devices. Thus, irrespective of the implementation, the examples/embodiments may be implemented on a computer system that includes one or more computing devices, wherein the one or more computing devices comprise one or more processor devices, and the one or more processor devices are configured to implement functionality disclosed herein.
- FIG. 4 is a block diagram of an example computing device (e.g., included in or implementing the local computing system 10 ) suitable for implementing examples according to one example.
- the computing device 400 may comprise any computing or electronic device capable of including firmware, hardware, and/or executing software instructions to implement the functionality described herein, such as a computer server, a desktop computing device, a laptop computing device, a smartphone, a computing tablet, or the like.
- the computing device 400 includes the processor device 402 , the system memory 404 , and a system bus 406 .
- the system bus 406 provides an interface for system components including, but not limited to, the system memory 404 and the processor device 402 .
- the processor device 402 can be any commercially available or proprietary processor.
- the system bus 406 may be any of several types of bus structures that may further interconnect to a memory bus (with or without a memory controller), a peripheral bus, and/or a local bus using any of a variety of commercially available bus architectures.
- the system memory 404 may include non-volatile memory 407 (e.g., read-only memory (ROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), etc.), and volatile memory 408 (e.g., random-access memory (RAM)).
- a basic input/output system (BIOS) 410 may be stored in the non-volatile memory 407 and can include the basic routines that help to transfer information between elements within the computing device 400 .
- the volatile memory 408 may also include a high-speed RAM, such as static RAM, for caching data.
- the computing device 400 may include or be coupled to a non-transitory computer-readable storage medium, such as the storage device 412 , which may comprise, for example, an internal or external hard disk drive (HDD) (e.g., enhanced integrated drive electronics (EIDE) or serial advanced technology attachment (SATA)), HDD (e.g., EIDE or SATA) for storage, flash memory, or the like.
- HDD enhanced integrated drive electronics
- SATA serial advanced technology attachment
- the storage device 412 and other drives associated with computer-readable media and computer-usable media may provide non-volatile storage of data, data structures, computer-executable instructions, and the like.
- a number of modules can be stored in the storage device 412 and in the volatile memory 408 , including an operating system 409 and one or more program modules, such as the hybrid package build architecture of the present disclosure (e.g., the local computing system 10 , operator 32 , etc.), which may implement the functionality described herein in whole or in part. All or a portion of the examples may be implemented as a computer program product 414 stored on a transitory or non-transitory computer-usable or computer-readable storage medium, such as the storage device 412 which includes complex programming instructions, such as complex computer-readable program code, to cause the processor device 402 to carry out the steps described herein.
- the hybrid package build architecture of the present disclosure e.g., the local computing system 10 , operator 32 , etc.
- All or a portion of the examples may be implemented as a computer program product 414 stored on a transitory or non-transitory computer-usable or computer-readable storage medium, such as the storage device 412 which includes complex programming instructions, such as complex computer-
- the computer-readable program code can comprise software instructions for implementing the functionality of the examples described herein when executed on the processor device 402 .
- the processor device 402 in conjunction with the instructions for the hybrid package build architecture 416 loaded in the volatile memory 408 , may serve as a controller, or control system, for the computing device 400 that is to implement the functionality described herein.
- a user may also be able to enter one or more configuration commands through a keyboard (not illustrated), a pointing device such as a mouse (not illustrated), or a touch-sensitive surface such as a display device.
- Such input devices may be connected to the processor device 402 through an input device interface 418 that is coupled to the system bus 406 but can be connected by other interfaces such as a parallel port, an Institute of Electrical and Electronic Engineers (IEEE) 1394 serial port, a Universal Serial Bus (USB) port, an IR interface, and the like.
- IEEE Institute of Electrical and Electronic Engineers 1394 serial port
- USB Universal Serial Bus
- the computing device 400 may also include the communications interface 420 suitable for communicating with the network 16 as appropriate or desired.
- the computing device 400 may also include a video port configured to interface with a display device to provide information to the user.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
- Container orchestration systems automate the deployment, scaling, and management of containerized applications among nodes in a cluster. Some applications can build packages (e.g., data packages, software packages, etc.) from packaged components.
- The examples disclosed herein provide for implementing a hybrid cloud package build architecture. In some examples, a local computer system can build packages that have some local dependencies and some dependencies obtained from an external repository. The external dependencies can include external package components that can be updated and deprecated over time. In some example implementations, the external package components can be fetched from the external repository as needed (or as expected to be needed), and a local cache can be automatically maintained to mirror package versioning in the external repository. In this manner, for example, a hybrid architecture can facilitate integration of local package components with up-to-date external package components fetched from an external repository.
- In one example a method is provided. The example method includes determining, by a computer system including one or more processor devices, a trigger for fetching an external package component for integration with a local package component. The example method includes transmitting, by the computer system and based on the trigger, a request to an external package repository to obtain the external package component. The example method includes receiving, by the computer system and responsive to the request, the external package component. The example method includes caching, by the computer system, the external package component for integration with the local package component.
- In another example, a computing device is provided. The example computing device includes a memory and a processor device coupled to the memory to determine a trigger for fetching an external package component for integration with a local package component. The example computing device includes the processor device coupled to the memory to transmit, based on the trigger, a request to an external package repository to obtain the external package component. The example computing device includes the processor device coupled to the memory to receive, responsive to the request, the external package component. The example computing device includes the processor device coupled to the memory to cache the external package component for integration with the local package component.
- In another example a non-transitory computer-readable storage medium is provided. The example non-transitory computer-readable storage medium includes executable instructions to cause one or more processor devices of one or more computing devices to determine a trigger for fetching an external package component for integration with a local package component. The instructions cause the processor device to transmit, based on the trigger, a request to an external package repository to obtain the external package component. The instructions cause the processor device to receive, responsive to the request, the external package component. The instructions cause the processor device to cache the external package component for integration with the local package component.
- Individuals will appreciate the scope of the disclosure and realize additional aspects thereof after reading the following detailed description of the examples in association with the accompanying drawing figures.
- The accompanying drawing figures incorporated in and forming a part of this specification illustrate several aspects of the disclosure and, together with the description, serve to explain the principles of the disclosure.
-
FIG. 1 is a block diagram of a runtime environment in which examples of a hybrid package build architecture according to example aspects of the present disclosure can be practiced; -
FIG. 2 is a flowchart of a method for implementing a hybrid package build architecture according to example aspects of the present disclosure according to one example; -
FIG. 3 is a simplified block diagram of the runtime environment illustrated inFIG. 1 according to one example; and -
FIG. 4 is a block diagram of an example of a computing device illustrated inFIG. 1 suitable for implementing examples according to one example. - The examples set forth below represent the information to enable individuals to practice the examples and illustrate the best mode of practicing the examples. Upon reading the following description in light of the accompanying drawing figures, individuals will understand the concepts of the disclosure and will recognize applications of these concepts not particularly addressed herein. It should be understood that these concepts and applications fall within the scope of the disclosure and the accompanying claims.
- Any flowcharts discussed herein are necessarily discussed in some sequence for purposes of illustration, but unless otherwise explicitly indicated, the examples are not limited to any particular sequence of steps. The use herein of ordinals in conjunction with an element is solely for distinguishing what might otherwise be similar or identical labels, such as “first message” and “second message,” and does not imply an initial occurrence, a quantity, a priority, a type, an importance, or other attribute, unless otherwise stated herein. The term “about” used herein in conjunction with a numeric value means any value that is within a range of ten percent greater than or ten percent less than the numeric value. As used herein and in the claims, the articles “a” and “an” in reference to an element refers to “one or more” of the element unless otherwise explicitly specified. The word “or” as used herein and in the claims is inclusive unless contextually impossible. As an example, the recitation of A or B means A, or B, or both A and B. The word “data” may be used herein in the singular or plural depending on the context.
- In some examples, software packages can be developed to have dependencies on packaged components. For instance, software packages can be built for deployment or distribution by combining or integrating a number of package components. Some packages can include off-the-shelf components. Traditionally, off-the-shelf components would need to be manually retrieved for building a package with other components. For instance, in some prior techniques, a local copy of an external repository could be manually constructed for access when building packages using local and external packages. But the external repository can be updated over time, rendering such a local copy out-of-date. For instance, external package components can be updated to new versions or deprecated and pulled from distribution. This generally presents a challenge for an administrator of the local copy to both know what is out of date and obtain the up-to-date package components (and any requisite further dependencies).
- Advantageously, example implementations according to the present disclosure can provide for implementing a hybrid package build architecture that automatically manages retrieval of external package components for integration with local package components. As an example, implementations can determine a trigger for fetching an external package component for integration with a local package component (e.g., for building a software package). Based on the trigger, implementations can transmit a request to an external repository to obtain the external package component. Responsive to the request, implementations can receive the external package component. Implementations can cache the external package component for integration with the local package component, and optionally for future use for future build tasks. In this manner, for example, the package build architecture can interface with external package sources (e.g., external package build architectures) to leverage the external resources and minimizing unnecessary duplicative build tasks.
- Example implementations are discussed herein in more detail with reference to the Figures by way of example only for the purposes of illustration.
-
FIG. 1 is a block diagram of an environment suitable for implementing an example optimization of a pipeline of services according to example implementations of the present disclosure. A local computing system can includeprocessor device 12 andmemory 14. In some implementations, thelocal computing system 10 may be a computing system that includes multiple computing devices. Alternatively, in some implementations, thelocal computing system 10 may be one or more computing devices within a computing system that includes multiple computing devices. Alternatively, thelocal computing system 10 can be implemented using shared resources of a computing device (e.g.,processor device 12 andmemory 14 being shared with one or more other systems, applications, processes, etc.). - As used herein, “local” can indicate an instantiation of a system or process under control, management, or access by a party associated with the system or process. For instance, “local” can indicate, but is not necessarily limited to, an on-premises instantiation of the system of process. For instance, “local” can indicate a cloud instantiation of the system or process.
- In some implementations, the
local computing system 10 can be implemented by a deployed application in a containerized environment. Theprocessor device 12 may include any computing or electronic device capable of executing software instructions to implement the functionality described herein. Thememory 14 can be or otherwise include any device(s) capable of storing data, including, but not limited to, volatile memory (random access memory, etc.), non-volatile memory, storage device(s) (e.g., hard drive(s), solid state drive(s), etc.). - The
local computing system 10 can communicate with one or more additional computing systems via anetwork 16. For example, the source computing system can communicate with anexternal computing system 18. Theexternal computing system 18 can include processor device(s) 20 andmemory 22. In some implementations, theexternal computing system 18 may be a computing system that includes multiple computing devices. Alternatively, in some implementations, theexternal computing system 18 may be one or more computing devices within a computing system that includes multiple computing devices. Alternatively, theexternal computing system 18 can be implemented using shared resources of a computing device (e.g., processor device(s) 20 andmemory 22 being shared with one or more other systems, applications, processes, such as withlocal computing system 10, etc.). In some implementations, theexternal computing system 18 can be implemented by a deployed application in a containerized environment. The processor device(s) 20 may include any computing or electronic device capable of executing software instructions to implement the functionality described herein. Thememory 22 can be or otherwise include any device(s) capable of storing data, including, but not limited to, volatile memory (random access memory, etc.), non-volatile memory, storage device(s) (e.g., hard drive(s), solid state drive(s), etc.). - In some implementations, a first party can manage or use the
local computing system 10 for building first party software packages. For instance, thelocal computing system 10 can provide a package build architecture for the first party development pipeline. For instance, a custom package can be built from multiple different package components from multiple different sources. Some package components can be local package components, such aslocal package component 24 available on alocal computing system 10 and developed by a first party for building a first party software package. For example, the first party can build first party software packages usinglocal package component 24 stored in thememory 14. For instance, first party software packages can include applications developed by the first party. - In some examples, some package components can be external package components, such as package components available from an external repository on a remotely managed system and developed by a third party for distribution. For instance, external package components can provide building blocks for various software functionalities, such that first party local package components can be built with dependencies on third party building blocks.
- For example, a third party can manage or use the
external computing system 18 for hosting or distributing third-party software packages. For instance, the third party can expose an external package repository 26 to thenetwork 16 for distribution ofexternal package components 28. Theexternal package components 28 can include software package components developed by the third party for providing various software functionalities and services. For instance, theexternal package components 28 can include building blocks of software functionality for combination with or integration into downstream software package builds. - To facilitate integration with local package components, example implementations of the present disclosure can provide for retrieving
external package components 28 from the external package repository 26. For example, in some implementations, thelocal computing system 10 can fetch theexternal package component 28 for integration with thelocal package component 24. - In some examples, implementations can provide for automatic maintenance of a local cache of external package components from one or more external repository sources. For instance, in some examples, a just-in-time caching scheme can be implemented to obtain external package components on-demand. In some examples, a predictive caching scheme can be implemented to obtain external package components based on predicted use of the external package components. In this manner, for example, implementations according to aspects of the present disclosure can provide for maintenance of an up-to-date cache that updates, replaces, or removes package components based on corresponding changes in the external repository.
- For instance, in some examples, fetched
external package component 28 can be stored in acache 30. For instance, thecache 30 can store fetchedexternal package component 28 for present and future use in building packages by thelocal computing system 10. - In some examples, a computer system can maintain a local cache based on a trigger system. For instance, a computer system can determine a trigger based on a need for an external package component. In some examples, the computer system can determine the need based on a queued or scheduled package build. For instance, the computer system can determine the need based on a list of package components associated with a package build task. In this manner, for instance, some implementations can provide for just-in-time or on-demand fetching of up-to-date external package components for loading into the cache for use in the package build.
- For example, in some implementations, the
local computing system 10 can fetch theexternal package component 28 based on a trigger. For instance, thelocal computing system 10 can determine a trigger event or condition. Additionally, or alternatively, anoperator 32 can determine a trigger event or condition. Theoperator 32 can be implemented as part of thelocal computing system 10, theexternal computing system 18, cooperatively between both, or on a different computing system. For instance, theoperator 32 can be executed as part of a service that provides one or more repository management services for the local computing system 10 (e.g., for the first party). - In some implementations, a package build task being queued can trigger a process for obtaining any
external package component 28 needed for the build task. For instance, the trigger can be based on configuration data associated with the package build task. For example, acustom resource 34 can be defined that sets out a policy for creating or maintaining thecache 30. Thecustom resource 34 can be a data structure containing definitions, instructions, links, network addresses, URLs, credentials, etc. The policy can include various rules for retrieving package components (e.g., update intervals, preferred hosts, versioning types, such as long term or nightly builds, etc.). - In some implementations, the
custom resource 34 can identify one or moreexternal package components 28 to be maintained in thecache 30. For instance, thecustom resource 34 can be associated with a particular package build task, and thecustom resource 34 can enumerate one or moreexternal package components 28 to be used for that particular package build task. In some examples, theexternal package components 28 can be identified with a version number. In some examples, theexternal package components 28 can be identified without requiring a particular version number, such as by identifying the package by name, and optionally referencing the recency of the version (e.g., “request PackageName; version=MostRecent”, etc.). In some examples, thecustom resource 34 can specify backward compatibility, such as to obtain the most recent package versions except when the most recent package versions are not backward compatible (e.g., “request PackageName; version=MostRecent; compatibility_level=CompatibleWithVersionX”, etc.). - In some implementations, a tagging system can identify
external package components 28. For instance,external package components 28 can be tagged to associate theexternal package components 28 with a particular package build task. Based on the tag association, theexternal package components 28 can be obtained from the external package repository 26 or thecache 30 when the package build task is executed. Based on the tag association, thelocal computing system 10 can monitor the package component source (e.g., the external package repository 26) for any changes, and update thecache 30 accordingly. - In general, the
custom resource 34 can contain instructions for directing a computer system (e.g., local computing system 10) to perform according to aspects of the present disclosure. For instance, thecustom resource 34 can instruct theoperator 32 to maintain thecache 30 in view of the external package repository 26 according to a desired policy. - In some implementations, a computer system can determine the need based on a projected or predicted use. For instance, usage data (e.g., log data) descriptive of external package component usage (e.g., collected over a period of time) can provide a basis for predicting future usage of external package components. For instance, a predictive model (e.g., a machine-learned predictive model) can predict future usage based on log data. In this manner, for instance, the computer system can prefetch external package components.
- For instance, a predicted package build task can trigger a process for obtaining expected
external package component 28 that are expected to be needed for a predicted build task. In another example, a prediction of likely needs forexternal package components 28 can trigger a process for obtaining the likely needed external package component 28 (e.g., separately from any predicted or scheduled build task). In another example, an interval of time (e.g., since the last cache update, the last update to a particular package component, etc.) can trigger a process for obtaining any updates to any packages stored in thecache 30. - Based on the trigger, the
local computing system 10 or theoperator 32 can transmit a request to theexternal computing system 18 to request the desired packages. In some examples, the request can be contemporaneously responsive to the trigger. In some examples, the request can be scheduled for some future time based on detecting the trigger at a first time. In some examples, the request can identify the desired package components with various levels of particularity. In some examples, the request can indicate a particular version or build of the package components. In some examples, the request can indicate a name of a package but allow theexternal computing system 18 to provide an updated version if available. For example, the request can indicate a list of packages and request any updates to the packages, if available. - In some implementations, the
local computing system 10 can receive any fetched external package components (e.g., from the external computing system 18) and store them in thecache 30. In some examples, the cachedexternal package components 28 can be used in multiple package build tasks, such as in subsequent package build tasks after a package build tasks that triggers an original request to retrieve or update the cachedexternal package components 28. For instance, theexternal package components 28 can be used in a first build task for integrating theexternal package components 28 with a first local package component and later retrieved from the cache for a second build task for integrating theexternal package components 28 with a second local package component. - In some implementations, the
local computing system 10 or theoperator 32 can initiate updates to thecache 30. For example, thelocal computing system 10 or theoperator 32 can monitor for any updates to packages in thecache 30. For example, thelocal computing system 10 or theoperator 32 can monitor thecache 30 to ensure that package components in thecache 30 are maintained. For instance, ifexternal package components 28 in thecache 30 are removed or altered, thelocal computing system 10 or theoperator 32 can repair thecache 30 by fetching a clean copy of theexternal package components 28 from the external package repository 26. In some examples, thelocal computing system 10 or theoperator 32 can monitor the external package repository 26 for any changes to any packages cached in thecache 30. For instance, thelocal computing system 10 or theoperator 32 can request an accounting of current versions of a list of packages (e.g., a list ofexternal package components 28 in the cache 30) and compare the versions in the external package repository 26 with the versions in thecache 30. Based on any differences, thelocal computing system 10 or theoperator 32 can trigger obtaining the current versions for updating thecache 30. - In some implementations, the
local computing system 10 can rebuild one or more downstream packages responsive to an update to theexternal package components 28 retrieved from the external package repository 26. For instance, thelocal computing system 10 can cause a rebuild of any packages with updated dependencies (e.g., updated based on a corresponding update to the external package repository 26). - In some implementations, the
local computing system 10 can provide a local repository of external packages for use by thelocal computing system 10. For instance, the local repository can be organized by a tagging system that associates packages with build tasks based on a tag assigned to the packages. In some implementations, anexternal package component 28 can be associated with a tag, and the assignment of the tag can be a trigger as discussed herein for obtaining theexternal package component 28. - In some examples, the local repository can be implemented in a containerized environment. For instance, a package build architecture can be implemented as one or more containerized application(s). Optionally, the one or more containerized application(s) can collectively form the
local computing system 10, even if the containerized application(s) are not physically localized together. In some examples, the package build architecture can be implemented as a pod of containerized application(s). - The term “containerized application” as used herein refers to an application that comprises one or more container images, and is initiated and managed via a container orchestration system. When executed, a container image is initiated as a Linux® container, wherein the Linux® kernel features cgroups and namespaces are used to isolate processes from one another. A container image is often created from a containerization technology, such as, by way of non-limiting example, Docker®, or the like. The term “container orchestration system” refers to a system that automates the deployment, scaling and management of containerized applications among nodes in a cluster. The Kubernetes® container orchestration system (Kubernetes.io) is one example of a container orchestration system. The term “resource” as used herein refers to any individual component managed by the container orchestration system for which, if requested, the container orchestration system will return information specific to the resource. In the Kubernetes® container orchestration system, each resource of an application is typically defined in a YAML Ain′t Markup Language (YAML) file and has a “kind” attribute (sometimes referred to herein as “type”) and a “name” attribute.
- Some examples discussed herein are provided in the context of the Kubernetes® container orchestration system and using terminology used in the Kubernetes® container orchestration system; however, the examples are applicable to any container orchestration system capable of deploying, scaling, and managing containerized applications among nodes in a cluster. Container orchestration systems automate the deployment, scaling, and management of containerized applications among nodes in a cluster. A containerized application may include tens or hundreds of different containers and other resources, and each container or resource may have any number of instances distributed over many different nodes in a cluster. Increasingly, especially in conjunction with cloud computing environments, a containerized application may be distributed over many different nodes in several different clusters.
- In some implementations, a containerized application can include a package build architecture. For instance, a package building software can be implemented in a containerized environment for deployment as a containerized application or in support of building containerized applications. In some examples, the package build architecture can include a central hub or server (e.g., in one container or containerized environment) that communicates with a number of workers (e.g., build nodes or daemons in the same container, in the same containerized environment, etc.). In this manner, for example, the central hub can optionally centralize database read or write access. In some examples, the package building software can be the Koji® package build software architecture, which can leverage koji-hub instances and use build daemons for building packages.
- In some implementations, the local repository can be implemented in a containerized application such that it appears to and is accessible by other containers in a pod. In some examples, multiple repository instances can be set up and maintained (e.g., multiple instances of
local computing system 10, multiple containers instantiated on one or more other systems, etc.). In some examples, the local repository can facilitate the retrieval ofexternal package components 28 from theexternal computing system 18 such that the other containers in the pod need not be in communication with theexternal computing system 18. Additionally, or alternatively, in some examples, the local repository can facilitate the retrieval ofexternal package components 28 from theexternal computing system 18 such that the other containers in the pod are not aware that theexternal package components 28 have been fetched externally instead of built locally. - In some examples, the containerized application can interact with or be instructed by an operator. For instance, an operator (e.g., an OpenShift operator) can instruct a central hub (e.g., koji-hub) to fetch updates from a particular external repository. In some examples, the instructions are based on the
custom resource 34. - In some implementations, the
operator 32 can be implemented by a native application in a containerized environment (e.g., a native application of a container orchestration system). For instance, theoperator 32 can be a runtime executed by the container orchestration system to monitor and interact with containerized applications running thereon. In some examples, theoperator 32 can be managed by a backplane providing lifecycle management of theoperator 32, such as by overseeing installation, updates of, and control over theoperator 32. In this manner, for instance, theoperator 32 itself can be more resilient against downtime or error, because inadvertent editing of or deletion of theoperator 32 can be resolved automatically by the backplane. - In some implementations, the
operator 32 can manage one or more local repositories. For instance, theoperator 32 can manage multiple instances of local repositories. - In some implementations, the
custom resource 34 can instruct thelocal computing system 10 or theoperator 32. For instance, thecustom resource 34 can include an instruction file configured for instructing a container orchestration component, such as a container orchestration operator, to maintain a state of a container. For instance, in some implementations a container can implement a local cache forming a repository, and the operator (e.g., operator 32) can maintain a state of the local cache according to the instructions in thecustom resource 34. - Various implementations according to the present disclosure can provide for a number of technical effects and benefits. For instance, example implementations can provide for improved system integrity and security. Relying on a manually created and maintained local cache of external package components can be error-prone. For instance, keeping up with the pace of development (e.g., for critical security patches, etc.) for a library of external package dependencies can be difficult if not impossible. Updates can be missed, leaving packages unpatched and possibly risking insecure deployments. In contrast, example implementations according to the present disclosure can provide for automatic techniques for monitoring a source of desired package components for updates and synchronizing and updating a local cache automatically based on any changes in the source repository. In this manner, for instance, the local cache can be made more reliable and provide for package builds that leverage up-to-date dependencies for improved system integrity and security.
- In some examples, example implementations can provide for improved latency for up-to-date package build tasks. For instance, prior approaches to resolving the need for current package components include exclusively obtaining externally-hosted package components from the external source. But such an approach relies on numerous requests for the same content from the external repository, generating redundant network traffic and causing delays in the build time while the package component(s) are fetched. In contrast, automatically maintaining an up-to-date local cache resolves the challenges of tracking current versioning while also providing for improved latency for repeated use of the fetched package components.
- In some examples, example implementations can facilitate improved firewall protection of sensitive local packages. For instance, some prior approaches to resolving the aforementioned challenges include using external build systems (e.g., external build systems integrated with an external repository, etc.). In contrast, however, the hybrid package build architecture of the present disclosure can prove for firewall rule enforcement to keep sensitive local package components (e.g., proprietary data, proprietary algorithms, etc.) from leaking out to the external build systems. In this manner, for instance, example implementations can facilitate improved firewall protection of sensitive local packages on computer systems.
- In some examples, example implementations can provide for decreased computation cost associated with new software builds. For instance, in some prior techniques, incorporating or integrating external dependencies would require rebuilding of the packages for every update, or even a complete rebuilding of a package build software. In contrast, example implementations according to the present disclosure can advantageously avoid unnecessary rebuilding of packages by leveraging the external package components directly obtained from the external repository and already built by the third party system(s).
- In some examples, example implementations can provide for increased speed of propagation of dependency updates through to a completed package build. For instance, by monitoring an external package repository for updates, and retrieving updates for external package components in a local cache, example implementations can automatically cause rebuilds of local package builds that include the updated external package components. In this manner, for instance, patches (e.g., security patches) can rapidly be propagated from an external source through to an output package build deployed in a local environment.
-
FIG. 2 is a flowchart of a method for implementing a hybrid package build architecture according to example aspects of the present disclosure.FIG. 2 will be discussed in conjunction withFIG. 1 . - At 200, a computing system (e.g., the
local computing system 10, theoperator 32, etc.) can determine a trigger for fetching an external package component for integration with a local package component. For instance, the external package component can be anexternal package component 28, and the local package component can be alocal package component 24 of thelocal computing system 10. - At 202, the
local computing system 10 or theoperator 32 can transmit, based on the trigger, a request to an external package repository (e.g., external package repository 26) to obtain the external package component. The request can be transmitted, for example by way ofnetwork 16. - At 204, the
local computing system 10 or theoperator 32 can receive, responsive to the request, the external package component. - At 206, the
local computing system 10 or theoperator 32 can cache the external package component (e.g., in cache 30) for integration with the local package component. - In some implementations, the
local computing system 10 or theoperator 32 can retrieve, from a cache, the external package component for integration with a second local package component. - In some implementations, the
local computing system 10 or theoperator 32 can update the cached external package component based on an update to the external package repository. - In some implementations, the
local computing system 10 or theoperator 32 can instruct, using a custom resource associated with the local package component, an operator component to update the cached external package component. - In some implementations, the
local computing system 10 or theoperator 32 can generate the request based on one or more instructions indicated in the custom resource. - In some implementations, the
local computing system 10 or theoperator 32 can generate, using a machine-learned model configured to receive log data descriptive of external package component usage, an output indicating a likelihood of use for one or more external package components of the external package repository, and generate the request based on the output. - In some implementations, the
local computing system 10 or theoperator 32 can cache the external package component in a local repository hosted in a container of a containerized environment. -
FIG. 3 is a simplified block diagram of the environment illustrated inFIG. 1 according to one implementation.Local computing system 10 includes theprocessor device 12 and thememory 14. Theprocessor device 12 is coupled to thememory 14. Theprocessor device 12 is to determine atrigger 300 for fetching anexternal package component 28 for integration with alocal package component 24. Theprocessor device 12 is to transmit, based on thetrigger 300, arequest 302 to an external package repository to obtain theexternal package component 28. Theprocessor device 12 is to receive, responsive to therequest 302, theexternal package component 28. Theprocessor device 12 is to cache theexternal package component 28 for integration with thelocal package component 24. - It is noted that while, for purposes of illustration and simplicity, the embodiments are illustrated as being implemented by computer system that comprises a single computing device that in turn comprises a single processor device, in practice the examples/embodiments disclosed herein may be implemented in a computer system that comprises any number of computing devices, each of which may comprise one or more processor devices. Thus, irrespective of the implementation, the examples/embodiments may be implemented on a computer system that includes one or more computing devices, wherein the one or more computing devices comprise one or more processor devices, and the one or more processor devices are configured to implement functionality disclosed herein.
-
FIG. 4 is a block diagram of an example computing device (e.g., included in or implementing the local computing system 10) suitable for implementing examples according to one example. Thecomputing device 400 may comprise any computing or electronic device capable of including firmware, hardware, and/or executing software instructions to implement the functionality described herein, such as a computer server, a desktop computing device, a laptop computing device, a smartphone, a computing tablet, or the like. Thecomputing device 400 includes theprocessor device 402, thesystem memory 404, and asystem bus 406. Thesystem bus 406 provides an interface for system components including, but not limited to, thesystem memory 404 and theprocessor device 402. Theprocessor device 402 can be any commercially available or proprietary processor. - The
system bus 406 may be any of several types of bus structures that may further interconnect to a memory bus (with or without a memory controller), a peripheral bus, and/or a local bus using any of a variety of commercially available bus architectures. Thesystem memory 404 may include non-volatile memory 407 (e.g., read-only memory (ROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), etc.), and volatile memory 408 (e.g., random-access memory (RAM)). A basic input/output system (BIOS) 410 may be stored in thenon-volatile memory 407 and can include the basic routines that help to transfer information between elements within thecomputing device 400. Thevolatile memory 408 may also include a high-speed RAM, such as static RAM, for caching data. - The
computing device 400 may include or be coupled to a non-transitory computer-readable storage medium, such as thestorage device 412, which may comprise, for example, an internal or external hard disk drive (HDD) (e.g., enhanced integrated drive electronics (EIDE) or serial advanced technology attachment (SATA)), HDD (e.g., EIDE or SATA) for storage, flash memory, or the like. Thestorage device 412 and other drives associated with computer-readable media and computer-usable media may provide non-volatile storage of data, data structures, computer-executable instructions, and the like. - A number of modules can be stored in the
storage device 412 and in thevolatile memory 408, including anoperating system 409 and one or more program modules, such as the hybrid package build architecture of the present disclosure (e.g., thelocal computing system 10,operator 32, etc.), which may implement the functionality described herein in whole or in part. All or a portion of the examples may be implemented as acomputer program product 414 stored on a transitory or non-transitory computer-usable or computer-readable storage medium, such as thestorage device 412 which includes complex programming instructions, such as complex computer-readable program code, to cause theprocessor device 402 to carry out the steps described herein. Thus, the computer-readable program code can comprise software instructions for implementing the functionality of the examples described herein when executed on theprocessor device 402. Theprocessor device 402, in conjunction with the instructions for the hybridpackage build architecture 416 loaded in thevolatile memory 408, may serve as a controller, or control system, for thecomputing device 400 that is to implement the functionality described herein. - A user may also be able to enter one or more configuration commands through a keyboard (not illustrated), a pointing device such as a mouse (not illustrated), or a touch-sensitive surface such as a display device. Such input devices may be connected to the
processor device 402 through aninput device interface 418 that is coupled to thesystem bus 406 but can be connected by other interfaces such as a parallel port, an Institute of Electrical and Electronic Engineers (IEEE) 1394 serial port, a Universal Serial Bus (USB) port, an IR interface, and the like. - The
computing device 400 may also include thecommunications interface 420 suitable for communicating with thenetwork 16 as appropriate or desired. Thecomputing device 400 may also include a video port configured to interface with a display device to provide information to the user. - Individuals will recognize improvements and modifications to the preferred examples of the disclosure. All such improvements and modifications are considered within the scope of the concepts disclosed herein and the claims that follow.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/876,192 US20240036851A1 (en) | 2022-07-28 | 2022-07-28 | Hybrid cloud package build architecture |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/876,192 US20240036851A1 (en) | 2022-07-28 | 2022-07-28 | Hybrid cloud package build architecture |
Publications (1)
Publication Number | Publication Date |
---|---|
US20240036851A1 true US20240036851A1 (en) | 2024-02-01 |
Family
ID=89665403
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/876,192 Pending US20240036851A1 (en) | 2022-07-28 | 2022-07-28 | Hybrid cloud package build architecture |
Country Status (1)
Country | Link |
---|---|
US (1) | US20240036851A1 (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9063818B1 (en) * | 2011-03-16 | 2015-06-23 | Google Inc. | Automated software updating based on prior activity |
US9582261B2 (en) * | 2014-06-26 | 2017-02-28 | Vmware, Inc. | Methods and apparatus to update application deployments in cloud computing environments |
US20180210712A1 (en) * | 2017-01-24 | 2018-07-26 | Salesforce.Com, Inc. | Methods and systems for performing a partial build |
US10409583B2 (en) * | 2017-11-27 | 2019-09-10 | Salesforce.Com, Inc. | Content deployment system having a content publishing engine with a filter module for selectively extracting content items provided from content sources for integration into a specific release and methods for implementing the same |
US20200241867A1 (en) * | 2019-01-30 | 2020-07-30 | Salesforce.Com, Inc. | Method and system for optimization of container image layering |
US11109339B2 (en) * | 2019-02-21 | 2021-08-31 | At&T Intellectual Property I, L.P. | Pre-provisioned access management containers for wireless services |
US11188354B1 (en) * | 2020-09-23 | 2021-11-30 | International Business Machines Corporation | Sharing cached class data in a containerized environment |
US20230195596A1 (en) * | 2021-12-16 | 2023-06-22 | Sap Se | Cloud agnostic shared load testing platform |
US20230244466A1 (en) * | 2022-01-28 | 2023-08-03 | Microstrategy Incorporated | Enhanced cloud-computing environment deployment |
-
2022
- 2022-07-28 US US17/876,192 patent/US20240036851A1/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9063818B1 (en) * | 2011-03-16 | 2015-06-23 | Google Inc. | Automated software updating based on prior activity |
US9582261B2 (en) * | 2014-06-26 | 2017-02-28 | Vmware, Inc. | Methods and apparatus to update application deployments in cloud computing environments |
US20180210712A1 (en) * | 2017-01-24 | 2018-07-26 | Salesforce.Com, Inc. | Methods and systems for performing a partial build |
US10409583B2 (en) * | 2017-11-27 | 2019-09-10 | Salesforce.Com, Inc. | Content deployment system having a content publishing engine with a filter module for selectively extracting content items provided from content sources for integration into a specific release and methods for implementing the same |
US20200241867A1 (en) * | 2019-01-30 | 2020-07-30 | Salesforce.Com, Inc. | Method and system for optimization of container image layering |
US10810003B2 (en) * | 2019-01-30 | 2020-10-20 | Salesforce.Com, Inc. | Method and system for optimization of container image layering |
US11109339B2 (en) * | 2019-02-21 | 2021-08-31 | At&T Intellectual Property I, L.P. | Pre-provisioned access management containers for wireless services |
US11188354B1 (en) * | 2020-09-23 | 2021-11-30 | International Business Machines Corporation | Sharing cached class data in a containerized environment |
US20230195596A1 (en) * | 2021-12-16 | 2023-06-22 | Sap Se | Cloud agnostic shared load testing platform |
US20230244466A1 (en) * | 2022-01-28 | 2023-08-03 | Microstrategy Incorporated | Enhanced cloud-computing environment deployment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11157255B2 (en) | Software asset management | |
US10936293B2 (en) | Container image layer reordering | |
CN111666080B (en) | Micro service cluster deployment method and device, computer equipment and storage medium | |
US10762075B2 (en) | Database interface agent for a tenant-based upgrade system | |
US11640434B2 (en) | Identifying resolutions based on recorded actions | |
US20140165060A1 (en) | Methods and apparatus to reclaim resources in virtual computing environments | |
US9575739B2 (en) | Performing unattended software installation | |
US20240223666A1 (en) | Multiple model injection for a deployment cluster | |
US9038059B2 (en) | Automatically targeting application modules to individual machines and application framework runtimes instances | |
US11144438B1 (en) | Incremental build system using an inferred dependency graph collected with a system monitor | |
US20130326503A1 (en) | Generating Super Templates to Obtain User-Requested Templates | |
US10949216B2 (en) | Support for third-party kernel modules on host operating systems | |
CN107483241B (en) | Method and device for downloading upgrade mirror image version in network element upgrading process | |
US20140040874A1 (en) | Implementing multiple versions of a plug-in concurrently | |
US11983519B2 (en) | Abort installation of firmware bundles | |
CN111666079B (en) | Method, apparatus, system, device and computer readable medium for software upgrade | |
US20240036884A1 (en) | Package maintenance architecture | |
US20240036851A1 (en) | Hybrid cloud package build architecture | |
CN107667343B (en) | System and method for loading on-demand resources | |
US20230067086A1 (en) | Transformation of cloud-based data science pods | |
AU2019205972B2 (en) | Software asset management | |
US20240330002A1 (en) | Bootable system image delta generator | |
US11720345B2 (en) | Pull based inner-loop code deployment | |
US20230153093A1 (en) | Systems and methods for managing workspaces in a heterogeneous workspace environment | |
US20240152371A1 (en) | Dynamic re-execution of parts of a containerized application pipeline |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: RED HAT, INC., NORTH CAROLINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GRIFFIN, LEIGH;ROSSETTI, LEONARDO;REEL/FRAME:060661/0161 Effective date: 20220728 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |